US20160062971A1 - Systems and methods to input or access data using remote submitting mechanism - Google Patents

Systems and methods to input or access data using remote submitting mechanism Download PDF

Info

Publication number
US20160062971A1
US20160062971A1 US14/405,443 US201314405443A US2016062971A1 US 20160062971 A1 US20160062971 A1 US 20160062971A1 US 201314405443 A US201314405443 A US 201314405443A US 2016062971 A1 US2016062971 A1 US 2016062971A1
Authority
US
United States
Prior art keywords
data
entering
user
pointer
submission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/405,443
Other versions
US10198417B2 (en
Inventor
Mitesh L. THAKKER
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of US20160062971A1 publication Critical patent/US20160062971A1/en
Application granted granted Critical
Publication of US10198417B2 publication Critical patent/US10198417B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • G06F17/243
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/174Form filling; Merging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/164File meta data generation
    • G06F17/3012
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/16Sound input; Sound output
    • G06F3/167Audio in a user interface, e.g. using voice commands for navigating, audio feedback
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Definitions

  • This invention relates to the field of data transmission systems, authentication and encryption systems. Particularly, this invention relates to a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism. Particularly, this invention also relates to an encryption system and method adapted to encrypt communication. Particularly, this invention also relates to a system and method for tracking a user using a system for data entering and submission for an online interface using a remote entering/submitting mechanism.
  • Data communication and data transfer systems envelope the entire spectrum of telecommunication and Internet based communication.
  • the term, ‘data’ incorporates the use of text data, voice data, multimedia data, and the like all forms of data.
  • a person has access to at least one mode of communication, which is the channel of communication.
  • the person hence, has access to at least a single node or device for accessing or using such channel of communication through such mode of communication.
  • This access to at least a single node of device may be a shared access such as a public access or an unshared access such as a private access.
  • a telephone facilitates voice data transfer from one telephone node to another telephone node over a telecommunication mode of communication.
  • An Internet connected computer system facilitates text, voice, and multimedia data transfer from one computer node to another computer node over an Internet mode of communication.
  • This computer node includes interfaces which allow a user to log-on so as to have a secure mode of communication. This may be an instant messaging system, an e-mail system, a P2P system, a VoIP system, or the like.
  • a first level of data entry system is for signing up so as to allow repetitive usage of the system in an authorized and secure manner.
  • the entered data is stored (securely) at a remote location.
  • a second level of data entry system is for using the previously signed-up information (or its portion) (i.e. the first level of entered data) to gain entry for usage of the system.
  • This second level of data entry is typically an authorization mechanism.
  • Data entry systems in online interfaces typically incorporate the use of text fields and an enter/accept/submit mechanism which facilitates submission of data entered in the text fields. Thus, when a user intends to enter/submit any information, the submit mechanism is triggered.
  • Submit mechanism known in the art comprise of user enabled submission, such as but not limited to a mouse enabled clicking of submit button or a keyboard enabled input system, typically the use of the ‘enter’ key on the keyboard.
  • user enabled submission such as but not limited to a mouse enabled clicking of submit button or a keyboard enabled input system, typically the use of the ‘enter’ key on the keyboard.
  • the submission is specifically carried out by an active input for direct submission from the user, and none of the known systems allow for a user to trigger a remote submission mechanism which enables the submission of data intended to be submitted/entered by such user, without the user having to specifically carry out an active input for direct submission.
  • first level of data is ordinarily personal data and needs to be stored securely.
  • second level of data which allows subsequent authorization or entry via an online interface also needs to be secure from hackers or scrupulous entities or spyware or malware entities.
  • Online mechanisms include advertisements which target potential users, customers, clients or the like. These advertisements may be placed at various locations such as search engines pages, social media sites, private websites or the like. Each advertisement attracts fees from the host site. However, in the event that an advertisement generates potential leads, an advertiser rarely comes to know the source of the advertisement or the placement of the advertisement which has led to the generation of potential lead(s). Hence, there is a need for a system which provides such information for the purposes of statistics and analytics.
  • An object of the invention is to provide a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism.
  • Another object of the invention is to provide a system and method for tracking a user using a system for data entering and submission for an online interface using a remote entering/submitting mechanism.
  • Yet another object of the invention is to provide a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism and a biometric identity system.
  • Still another object of the invention is to provide a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism in an encrypted and authorized manner.
  • An additional object of the invention is to provide a system and method for tracking a user using a system for data entering and submission for an online interface using a remote entering/submitting mechanism in an encrypted and authorized manner.
  • a system and method for tracking a user using a system for data entering and submission for an online interface using a remote entering/submitting mechanism is provided.
  • the system and method of this invention is a new online approach to data submission, user or data authentication with the following key features:
  • a system for data entering and submission for an online interface using a remote entering/submitting mechanism comprising:
  • a system for data entering and submission for an online interface using a remote entering/submitting mechanism comprising:
  • an encryption system and method adapted to encrypt communication employed with the system for data entering and submission for an online interface using a remote entering/submitting mechanism, said system comprising:
  • the second input means is adapted to allow an input of a data other than voice data such as but not limited to a pin, a code, an OTP or a T-Pin.
  • a method for data entering and submission for an online interface using a remote entering/submitting mechanism wherein said method further comprises a method adapted to encrypt communication comprising the steps of:
  • an encryption method and method adapted to encrypt communication comprising the steps of:
  • a computer program product for data entering and submission for an online interface using a remote entering/submitting mechanism, the computer program product embodied in a computer readable medium that, when executing on a computer, performs steps comprising
  • FIG. 1 illustrates a schematic of the system for data entering and submission for an online interface using a remote entering/submitting mechanism.
  • the entry mechanism to the data entry field is a routine entry mechanism selected from a group of devices comprising a keyboard, a mouse, a gesture device, a touch interface device, a pointer device, a stylus and interface device, and the like.
  • a remote entering/submitting mechanism ( 20 ).
  • This remote entering/submitting mechanism includes or involves a device ( 22 ) for facilitating the remote entry or remote submission.
  • This device may be one selected from a group consisting of a phone, a cell phone, a mobile phone or any phone or telecommunication enabled data entry device or any Internet enabled data entry device or any wireless communication based data entry device or wired communication based data entry device.
  • the device ( 22 ) may be the same as the device used for facilitating the entry mechanism to the at least one data entry field ( 12 ) in an online interface ( 10 ).
  • the device ( 22 ) may not be the same as the device used for facilitating the entry mechanism to the at least one data entry field ( 12 ) in an online interface ( 10 ).
  • the remote entering/submitting mechanism ( 20 ) comprises a pointer generating system ( 24 ) adapted to generate or retrieve pointer data ( 14 ) to be displayed on the online interface system ( 10 ).
  • This pointer data for example may be a telephone number to which a call is to be made or a number to which a message is to be sent or an identity to which internet based or telecommunication based data is to be sent from the device ( 22 ).
  • This pointer is generated or selected from a list of numbers, selected from a pre-populated database ( 26 ), which are pre-defined for the use of the system of this invention.
  • This pointer may also be generated or selected from a list of identities (such as e-mail identities or messaging identities), selected from a pre-populated database ( 26 ), which are pre-defined for the use of the system of this invention.
  • the ‘pointer’ may be a combination of alphanumeric characters or other symbols which may represent a specific identifiable characteristic such as but not limited to a telephone number, a mobile number, SMS Keyword, Short Code, extension number, numerical input after connecting to a call, email ID, PIN (personal identification number) number, TIN (Telephone Identification Number), a URL (uniform resource locator), or a combination thereof.
  • the pointer or pointer data may also be a coded means such as but not limited to a QR code (Quick Response Code), a hint or secret question, a captcha enabled access, an image, a sound or music based communication, a puzzle or a hint statement.
  • QR code Quick Response Code
  • hint or secret question a hint or secret question
  • captcha enabled access an image, a sound or music based communication, a puzzle or a hint statement.
  • a pointer may be distinct and unique in association to a pointer parameter, such that a pointer is used to indicate and identify the pointer parameter.
  • the pointer parameter for example may be the particular webpage where the pointer is displayed, geographical location of a user, time of display and other such identifiable parameters which are particularly used for user tracking or user verification or user authentication.
  • the pointers may be continuously distinct in association to a pointer parameter or may be reused or recycled from time to time or in the form of sessions, such that at a given instant of time or session every pointer is unique to a pointer parameter irrespective of whether the pointer was associated to the same or different pointer parameter in a previous period of time or session, which is not valid or live at the said given instant of time or session.
  • the remote entering/submitting mechanism ( 20 ) comprises a central interface system ( 30 ) adapted to receive communication from the device ( 22 ) in response to generated pointer data.
  • the central interface system ( 30 ) may further comprise an acknowledgement means ( 32 ) adapted to acknowledge communication from a device ( 22 ) in relation to a generated pointer.
  • This acknowledgement means may include an Interactive Voice Response means.
  • Interactive Voice Response (IVR) is an electronic system that provides voice response to a user's query initiated via telephone and any remote communication device. Conventional IVR solution comprises a computer with IVR software.
  • the acknowledgement means may include a means ( 34 ) for prompting a user to annunciate a data, preferably a text data.
  • the text data may be any random text data generated by the system or may be a voice captcha or the like. Further, it may include a biometric identity system ( 36 ) adapted to recognize voice of a user for acknowledging submission. It is to be understood that the biometric identity system is trained during initialization to recognize a user's voice and the trained set of data and parameters is securely stored and recalled as and when the biometric identity system ( 36 ) of a recognized or pre-registered user is activated.
  • the remote entering/submitting mechanism ( 20 ) comprises a central database ( 26 ) adapted to store correlative information in relation to various types of pre-defined pointer data.
  • a first type of pointer data may relate to a pre-defined mobile number for acknowledgement means ( 32 ), said first type of pointer data adapted to be generated if a user lands on the online interface by directly typing in the URL of the online interface in a browser's address bar.
  • a second type of pointer data may relate to a pre-defined mobile number for acknowledgement means ( 32 ), said second type of pointer data adapted to be generated if a user lands on the online interface by clicking on an advertisement on any web-site, mobile site, mobile app or search engine results' page or any digital property connected via internet, intranet or network.
  • a third type of pointer data may relate to a pre-defined mobile number for acknowledgement means ( 32 ), said third type of pointer data adapted to be generated if a user lands on the online interface by clicking an advertisement on another webpage.
  • a fourth type of pointer data may relate to a pre-defined e-mail identity for acknowledgement means ( 32 ), said fourth type of pointer data adapted to be generated if a user lands on the online interface by directly typing in the URL of the online interface in a browser's address bar.
  • Such and further various types of pointer data may be defined and stored in the central database ( 26 ) so that information in relation to usage for data analytics and statistics may be collated.
  • various data analytic means and various statistical and correlation means may be employed in relation to the various embodiments of the system and method of this invention.
  • the submission of data enabled by submission component is enabled and said data is submitted to a data submission server.
  • a single server or a central server may comprise one or more databases of the current system.
  • data submission server may or may not be a part of a central server.
  • the pointer or pointer data may be same for multiple sessions simultaneously.
  • the pointer or pointer data may be different for each of multiple sessions simultaneously.
  • the said system further comprises of a system for allowing a user to input or submit data into a form or a data input interface on an online interface by way of an offline communication made through a separate communication device, wherein the offline communication made is a communication selected from a group comprising a phone call, an SMS, an MMS, electronic communication, a an email, and a combination thereof.
  • the method for data entering and submission for an online interface using a remote entering/submitting comprising receiving a communication linked to a pointer data from an electronic device, by a central interface system is enabled by an offline communication made through a separate communication device, wherein the offline communication made is a communication including a phone call, a SMS, a MMS, electronic communication, a an email, and a combination thereof.
  • the data in the text fields or data entry field may be submitted using various pointer data that is generated and with the aid of the remote entering/submitting mechanism using the generated pointer data to perform the act of entering/submitting.
  • unique identity of the remote entering/submitting mechanism may be captured by the central interface system. The user is prompted to connect to the central interface system, proactively, by means of the remote entering/submitting mechanism and by using the generated pointer data. Such unique identity may be unique to a user or unique to a session. Such unique identity may or may not be stored in the system.
  • an encryption system and method adapted to encrypt communication.
  • the communication may be any data communication over a wired communication channel, a wireless communication channel, a telecommunication communication channel, an Internet communication channel, a network communication channel, or the like.
  • the encryption system provides a solution for a safe and secure authentication system and method.
  • this invention provides an encryption system and method for data entering and submission for an online interface using a remote entering/submitting mechanism in an encrypted and authorized manner.
  • FIG. 2 illustrates a schematic of the encryption system adapted to encrypt communication.
  • a first input means ( 102 ) adapted to allow a user to input an identity.
  • the identity is a user-generated identity.
  • This identity without limitation may be a text based identity. This identity may or may not be stored by the system of this invention.
  • a second input means ( 104 ) adapted to allow an input of a voice data in the user's own voice.
  • a user may be prompted to speak in to an audio receipt component of the system.
  • a voice detection mechanism identifies/extracts key parameters from the received voice data in order to determine the uniqueness of the voice data and the corresponding user.
  • each user may be provided with a specific user-defined or system-defined text data which is unique to the user.
  • the system may be trained only to receive the user-defined or system-defined text or any data in the voice of the user, in full or in part, in order to recognize a user.
  • a unique code generation means ( 110 ) adapted to generate a unique code whenever a user generates a request for communication.
  • the unique code is generated by an encryption algorithm which receives the first input data and the second input data.
  • the unique code is a derivative of the first input data and the second input data in correlation with the parameters defined by the encryption algorithm for encrypting.
  • This unique code generation means is a real time unique code generation means which generates the unique code in real time.
  • the real time unique generated code may be an alphanumeric code.
  • the real time unique generated code may be a voice captcha code based on previously stored or trained second registration data.
  • the generated unique code may be stored in a database ( 116 ) in encrypted manner in order to reference a user for all authorization.
  • the system uses this real time unique code for storage and verification, while the first input data and the second input data is not stored anywhere in the system or the database ( 116 ), and every time a real time unique code will be generated, temporarily stored and verified in encrypted manner for authorization. This ensures protection from hacking or reverse engineering.
  • a computation means ( 112 ) adapted to create a verification code in accordance with the code that is to be received from the user for the purposes of matching.
  • This verification code is also the same combination that the unique code generation means ( 110 ) intends to create. This verification code may be generated in real time.
  • the data, in each of the means of the system and method of this invention, may be ‘encrypted’ and suitably ‘decrypted’ as and when required.
  • the systems and methods of the present invention are made applicable to a do-not-disturb (DND) mode registry or a do-not-disturb mode enabled device.
  • DND do-not-disturb
  • the systems of the present invention comprise a do-not-disturb mode detection component, which may be linked to a do-not-disturb registry.
  • the methods of the present invention comprise the step of identifying whether an electronic device is enabled or activated with a DND mode.
  • the absence of clickable submit button or other means of allowing a user to enter/submit the data on the said online interface induces a user to voluntarily establishing communication with a vendor or caller thereby circumventing the restriction created by DND mode.
  • DND do-not-disturb
  • DND mode means a mode activated on a telecommunication device which prevents communication to the said device by a set of vendors or callers, said vendors or callers typically intending to initiate communication with consumers in general for commercial or advertising purposes.
  • the said communication is typically telephonic calls or instant messages or SMS.
  • the term ‘do-not-disturb’ can be alternately used instead of the term ‘do-not-call’.
  • Any registry indexing one or more of such DND mode activated telecommunication devices may be referred to as a DND Registry.
  • a DND Registry is deemed to include a ‘Customer Call Preference Registry’ or a ‘Do not Call’ registry.
  • the systems of the present invention further comprise a parallel communication triggering component.
  • the parallel communication triggering component is capable of initiating a communication between the user of the system and a second person or second system such as but not limited to a telecommunication system or an Interactive voice response system (IVR), said communication being initiated either before or during or after the step of submission of data is being enabled.
  • said communication may be made by employing a pointer parameter to determine the second person or second system to which the communication is being made.
  • the systems and methods of the present invention may allow a parallel communication triggering based on the pointer data or pointer parameter of the first level of data, and may be triggered prior to or simultaneous to or subsequent to the submission of data by submission component.
  • the systems and methods of the present invention may identify or authenticate or store or match a voice print.
  • a voice print may be a graphic representation of a person's voice, showing the component frequencies as analyzed by a sound spectrograph.
  • the systems and methods of the present invention may involve or be coupled with or incorporate additional systems or methods for user tracking.
  • ‘user tracking’ or ‘tracking a user’ involves tracking of or recording of or storing and transferring data of activities or behavior or preferences or intent of a user. Examples of activities may be selected from but not limited to series of clicks, access of links, access of advertisements, shopping activities, downloading of information, uploading of information, social network activities, RSS Feeds Subscription.
  • Preference of a user may be derived from the history of user activity or the user profile details.
  • Intent of a user may be a prediction of the interest or requirement of a user based on an algorithm for enabling such prediction. Based on user tracking, the pointer parameter may be designated.
  • system may further comprise of a ‘user tracking data transfer component’ which is capable of transferring or submitting user tracking data to the data submission server.
  • User tracking can in turn be used to facilitate ‘advertisement tracking’ which shall enable derivation of analytics or details or performance measuring of one or more advertisements linked directly or indirectly to user tracking.
  • the systems and methods of the present invention may involve or be coupled with or incorporate additional systems or methods for Ecommerce user Credit Rating or Ecommerce User Credit Rating Registry.
  • Ecommerce User Credit Rating shall mean a rating or grading or credibility points assigned to an identity such as but not limited to name, telephone no, email address, registration number or the like, based on a person's activity pattern or default pattern or fraud pattern in respect of payment delays or payment defaults for either partial payments or full payments or repeated instances of try & return of goods, wherein pattern may be data linked to a series of activities. This may extend to Cash on Delivery systems or Collect on Delivery systems or Try & Return schemes.
  • the systems and methods of the present invention may involve or be coupled with or incorporate additional systems or methods for Unethical User Tracking System (UEUTS).
  • UEUTS Unethical User Tracking System
  • systems and methods of the present invention may involve or be coupled with or be linked to any registry.
  • pre-defined with respect to a component or data or item or program means that a particular identity or indicia is defined at an instant prior to the instant of using the component or data or item or program.
  • pre-registered with respect to a component or data or item or program means that indexing or registration of the component or data or item or program is done at an instant prior to the instant of using the component or data or item or program.
  • pre-populated with respect to a component or data or item or program means that clustering or clubbing or populating of the component or data or item or program is done at an instant prior to the instant of using the component or data or item or program.
  • pointer and ‘pointer data’ can be alternatively and interchangeably used for the purpose of this invention.
  • data entering and submission is a means to input data as well as access data.
  • the systems of the present invention in an embodiment are made accessible through a portal or an interface which is a part of, or may be connected to, the internet or World Wide Web or any similar portal, wherein the portals or interfaces are accessed by one or more of users through an electronic device, whereby the user may send and receive data to the portal or interface which gets stored in at least one memory device or at least one data storage device or at least one server, and utilizes at least one processing unit.
  • the portal or interface in combination with one or more of memory device, data storage device, processing unit and serves, form an embedded computing setup, and may be used by, or used in, one or more of a computer program product.
  • the embedded computing setup and optionally one or more of a computer program product, in relation with, and in combination with the said portal or interface forms one of the systems of the invention.
  • Typical examples of a portal or interface may be selected from but is not limited to a website, an executable software program or a software application.
  • a user through a personal computer fills a web page based online enquiry form with the details of his name, contact details and enquiry summary on a commercial website but cannot submit the data by using any key on the keyboard of his personal computer, nor is a clickable submitted button allowed on the webpage.
  • the webpage displays a pointer data in the form of a telephone number to which the user is required to call.
  • the user calls the telephone number through his mobile phone, and the pointer data is communicated to the central interface system, and the submission component submits the said online enquiry form remotely.
  • a user through a personal computer fills a web page based online enquiry form with the details of his name, contact details and enquiry summary on a commercial website but cannot submit the data by using any key on the keyboard of his personal computer, nor is a clickable submitted button allowed on the webpage.
  • the webpage displays a pointer data in the form of a keyword to be sent via a text message or SMS to a telephone number by the user.
  • the user sends a text message containing the keyword to the telephone number through his mobile phone, and the pointer data is communicated to the central interface system, and the submission component submits the said online enquiry form remotely.
  • a user through a personal computer fills a web page based online enquiry form with the details of his name, contact details and enquiry summary on a commercial website but cannot submit the data by using any key on the keyboard of his personal computer, nor is a clickable submitted button allowed on the webpage.
  • the webpage displays a pointer data in the form of a QR Code to be scanned and sent to an email address by the user.
  • the user sends an email containing the scanned QR code through by opening another webpage containing email interface on the personal computer and the pointer data is communicated to the central interface system, and the submission component submits the said online enquiry form remotely.
  • a user through a personal computer fills a web page based online enquiry form with the details of his name, contact details and enquiry summary on a commercial website but cannot submit the data by using any key on the keyboard of his personal computer, nor is a clickable submitted button allowed on the webpage, as soon as the system identifies that the user's phone is activated with DND Mode.
  • the webpage displays a pointer data in any of the forms mentioned in the above examples.
  • a user while logging into his email interface is required to first enter his login ID then authenticate himself/herself by voice enabled password, which acts as the pointer data and shall trigger remote submission and authentication of the user to allow access to his/her email interface.
  • the webpage displays a pointer data in the form of a telephone number to which the user is required to call and speak a word in his own voice.
  • the user calls the said telephone number and speaks the word in his own voice, which is encrypted using the encryption mechanism of one of the embodiments of the system and then matched and authenticated to allow the submission of the entered data and allow access of the email interface to the user. If the user speaks a wrong word or a person other than the user speaks a word in the call to the telephone number, then the further process will cease and user will be denied access to email interface.
  • the systems and methods of the invention may simultaneously involve more than one user or more than one data storage device or more than one host server or any combination thereof.
  • a user may provide user input through any suitable input device or input mechanism such as but not limited to a keyboard, a mouse, a joystick, a touchpad, a virtual keyboard, a virtual data entry user interface, a virtual dial pad, a software or a program, a scanner, a remote device, a microphone, a webcam, a camera, a fingerprint scanner, pointing stick, or any combination thereof.
  • a suitable input device or input mechanism such as but not limited to a keyboard, a mouse, a joystick, a touchpad, a virtual keyboard, a virtual data entry user interface, a virtual dial pad, a software or a program, a scanner, a remote device, a microphone, a webcam, a camera, a fingerprint scanner, pointing stick, or any combination thereof.
  • the systems and methods can be practiced using any electronic device which may be connected to one or more of other electronic device with wires or wirelessly which may use technologies such as but not limited to, Bluetooth, WiFi, Wimax. This will also extend to use of the aforesaid technologies to provide an authentication key or access key or electronic device based unique key or any combination thereof.
  • the systems and methods can be practiced using any electronic device which may contain or may be infected by one or more of an undesirable software such as but not limited to a virus, or a Trojan, or a worm, malware, spyware, adware, scareware, crimeware, rootkit or any combination thereof.
  • an undesirable software such as but not limited to a virus, or a Trojan, or a worm, malware, spyware, adware, scareware, crimeware, rootkit or any combination thereof.
  • system may involve software updates or software extensions or additional software applications.
  • one or more user can be blocked or denied access to one or more of the aspects of the invention.
  • the term ‘encrypt’ or ‘encryption’ means the process of converting digital information into a new form using a key or a code or a program, wherein the new form is unintelligible or indecipherable to a user or a thief or a hacker or a spammer.
  • the term ‘encryption’ includes encoding, compressing, or any other translating of the digital content.
  • the encryption of the digital media content is performed in accordance with an encryption/decryption algorithm.
  • the encryption/decryption algorithm utilized is not hardware dependent and may change depending on the digital content. For example, a different algorithm may be utilized for different websites or programs.
  • the term ‘encryption further includes one or more aspects of authentication, entitlement, data integrity, access control, confidentiality, segmentation, information control, and combinations thereof.
  • the described embodiments may be implemented as a system, method, apparatus or article of manufacture using standard programming and/or engineering techniques related to software, firmware, hardware, or any combination thereof.
  • the described operations may be implemented as code maintained in a “computer readable medium”, where a processor may read and execute the code from the computer readable medium.
  • a computer readable medium may comprise media such as magnetic storage medium (e.g., hard disk drives, floppy disks, tape, etc.), optical storage (CD-ROMs, DVDs, optical disks, etc.), volatile and non-volatile memory devices (e.g., EEPROMs, ROMs, PROMs, RAMs, DRAMs, SRAMs, Flash Memory, firmware, programmable logic, etc.), etc.
  • the code implementing the described operations may further be implemented in hardware logic (e.g., an integrated circuit chip, Programmable Gate Array (PGA), Application Specific Integrated Circuit (ASIC), etc.). Still further, the code implementing the described operations may be implemented in “transmission signals”, where transmission signals may propagate through space or through a transmission media, such as an optical fiber, copper wire, etc.
  • the transmission signals in which the code or logic is encoded may further comprise a wireless signal, satellite transmission, radio waves, infrared signals, Bluetooth, etc.
  • the transmission signals in which the code or logic is encoded is capable of being transmitted by a transmitting station and received by a receiving station, where the code or logic encoded in the transmission signal may be decoded and stored in hardware or a computer readable medium at the receiving and transmitting stations or devices.
  • An “article of manufacture” comprises computer readable medium, hardware logic, and/or transmission signals in which code may be implemented.
  • a device in which the code implementing the described embodiments of operations is encoded may comprise a computer readable medium or hardware logic.
  • network means a system allowing interaction between two or more electronic devices, and includes any form of inter/intra enterprise environment such as the world wide web, Local Area Network (LAN), Wide Area Network (WAN), Storage Area Network (SAN) or any form of Intranet.
  • LAN Local Area Network
  • WAN Wide Area Network
  • SAN Storage Area Network
  • the systems and methods can be practiced using any electronic device.
  • An electronic device for the purpose of this invention is selected from any device capable of processing or representing data to a user and providing access to a network or any system similar to the internet, wherein the electronic device may be selected from but not limited to, personal computers, mobile phones, laptops, palmtops, portable media players and personal digital assistants.
  • computer program code for carrying out operations or functions or logic or algorithms for aspects of the present invention may be written in any combination of one or more programming languages which are either already in use or may be developed in future, such as but not limited to Java, Smalltalk, C++, C, Foxpro, Basic, HTML, PHP, SQL, Javascript, COBOL, Extensible Markup Language (XML), Pascal, Python, Ruby, Visual Basic .NET, Visual C++, Visual C# .Net, Python, Delphi, VBA, Visual C++ .Net, Visual FoxPro, YAFL, XOTcI, XML, Wirth, Water, Visual DialogScript, VHDL, Verilog, UML, Turing, TRAC, TOM, Tempo, Tcl-Tk, T3X, Squeak, Specification, Snobol, Smalltalk, S-Lang, Sisal, Simula, SGML, SETL, Self, Scripting, Scheme, Sather, SAS, Ruby, RPG, Rigal, Rexx, Regular Expressions, Reflecti Language (XML),
  • the algorithm or logic or program or code associated with encryption systems and methods may be maintained in a device which is separate from the device or server in which the encryption systems and methods are enabled.
  • the systems and methods of the present invention can be used and made applicable for any online or network based activities such as but not limited to monetary transactions, online shopping, social networks, emails, chatting, on-line gaming sessions, messaging, multimedia-conferencing, application-sharing, e-voting, group-ware & collaboration, blogging, or any combination thereof.
  • the algorithm used for encryption may have the following formula:
  • ALG ALG1(op1)ALG2(op2)ALG3 . . . (opN)ALGN+1,
  • the encryption algorithm may be different for different systems.
  • any action or process related to the systems and methods in accordance with the present invention may execute entirely on a user's computing device, partly on a user's computing device, as a stand-alone software package, partly on a user's computing device and partly on a remote computing device or entirely on the remote computer or a server.
  • a user input is anything or any data or metadata provided by a user actively and with the users knowledge in the form of one or more alphabets or characters or any string or any computer program or any computer file.
  • the systems and methods of the present invention may involve and provide methods to run self check, trouble shooting or program debugging.
  • a user is any person, machine or software that uses or accesses one or more of the systems or methods of the present invention.
  • a user includes an automated computer program and a robot.
  • the said code may have a combination of numeric or alphanumeric or symbolic characters used for protected and restricted access provided to a user to one or more digital systems or function or data, provided after necessary authentication or identification of the user.
  • the encryption mechanism can be used by enabling a plugin or application or an icon or a bookmark on a website or a software or any graphical user input that is used for the systems and methods in accordance with the present invention.
  • the encryption mechanism further comprises of one or more components which can be combined with one or more of other components of the mechanism in any combination, in an encrypted or unencrypted state, to generate an encryption key.
  • the systems and methods can be practiced using any electronic device.
  • An electronic device for the purpose of this invention is selected from any device capable of processing or representing data to a user and providing access to a network or any system similar to the internet, wherein the electronic device may be selected from but not limited to, personal computers, mobile phones, laptops, palmtops, portable media players and personal digital assistants.
  • the systems and methods of the present invention provides or enables a user interface which may allow commands for a command line interface and/or a graphical user interface (GUI) enabling a user to create, modify and delete data or metadata or program or logic or algorithm or parameters associated with encryption method or encryption program or encryption language.
  • GUI graphical user interface
  • the system may involve software updates or software extensions or additional software applications.
  • any form of internet security such as but not limited to, a firewall or antivirus or antimalware or registry protection can be used by a user in the same or different electronic device either simultaneously or separately, along with the systems or methods of the present invention.
  • one or more user can be blocked or denied access or be required to reattempt access, to one or more of the aspects of the invention.
  • a user may have a system to record or send alert or be informed in case any other user is accessing the user's electronic device remotely.
  • the systems and methods of the invention may simultaneously involve more than one user or more than one data storage device or more than one host server or any combination thereof.
  • the systems and methods of the present invention are used to prevent or restrict hacking or related phenomenon such as but not limited to phishing, man in the middle attack, inside jobs, rogue access points, back door access, use of viruses and worms, use of trojan horses, denial of service attack, sniffing, spoofing, ransomware or any combination thereof.

Abstract

Systems and methods for data entering and submission for an online interface using a remote entering/submitting mechanism, said system comprising:
    • a. at least one data entry field in an online interface;
    • b. a remote entering/submitting mechanism comprising:
      • i. a pointer generating or retrieving system adapted to generate a pointer data to be displayed on the online interface;
      • ii. a central interface system adapted to receive a communication linked to a pointer data from an electronic device;
      • iii. a pre-populated database comprising one or more pointer data which are pre-defined; and
      • iv. a central database adapted to store correlative information in relation to one or more pre-defined pointer data; and
    • c. a submission component capable of submitting data after receiving the communication from the electronic device.

Description

    FIELD OF THE INVENTION
  • This invention relates to the field of data transmission systems, authentication and encryption systems. Particularly, this invention relates to a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism. Particularly, this invention also relates to an encryption system and method adapted to encrypt communication. Particularly, this invention also relates to a system and method for tracking a user using a system for data entering and submission for an online interface using a remote entering/submitting mechanism.
  • BACKGROUND OF THE INVENTION
  • Data communication and data transfer systems envelope the entire spectrum of telecommunication and Internet based communication. The term, ‘data’, incorporates the use of text data, voice data, multimedia data, and the like all forms of data. In the present digital age a person has access to at least one mode of communication, which is the channel of communication. The person, hence, has access to at least a single node or device for accessing or using such channel of communication through such mode of communication. This access to at least a single node of device may be a shared access such as a public access or an unshared access such as a private access.
  • For personal, business, professional, or any other reason, effective and safe data communication and data transfer is the order of the current digital era. E.g. a telephone facilitates voice data transfer from one telephone node to another telephone node over a telecommunication mode of communication. An Internet connected computer system facilitates text, voice, and multimedia data transfer from one computer node to another computer node over an Internet mode of communication. This computer node includes interfaces which allow a user to log-on so as to have a secure mode of communication. This may be an instant messaging system, an e-mail system, a P2P system, a VoIP system, or the like.
  • For each of these online interfaces, data entry systems are required. In most cases, a two-level data entry system is required. A first level of data entry system is for signing up so as to allow repetitive usage of the system in an authorized and secure manner. In the first level of data entry, the entered data is stored (securely) at a remote location. A second level of data entry system is for using the previously signed-up information (or its portion) (i.e. the first level of entered data) to gain entry for usage of the system. This second level of data entry is typically an authorization mechanism. Data entry systems in online interfaces typically incorporate the use of text fields and an enter/accept/submit mechanism which facilitates submission of data entered in the text fields. Thus, when a user intends to enter/submit any information, the submit mechanism is triggered. Submit mechanism known in the art, more particularly in network based systems, comprise of user enabled submission, such as but not limited to a mouse enabled clicking of submit button or a keyboard enabled input system, typically the use of the ‘enter’ key on the keyboard. In each of the aforementioned cases, the submission is specifically carried out by an active input for direct submission from the user, and none of the known systems allow for a user to trigger a remote submission mechanism which enables the submission of data intended to be submitted/entered by such user, without the user having to specifically carry out an active input for direct submission.
  • Further, the entered first level of data is ordinarily personal data and needs to be stored securely. Further, second level of data which allows subsequent authorization or entry via an online interface also needs to be secure from hackers or scrupulous entities or spyware or malware entities. Hence, there is a need for a secure encryption and authorization mechanism which facilitates the provisioning of a secure environment.
  • Even though, this data stored securely is secure data, it is comprehensively used by many companies and web-entities for user-specific purposes such as targeted advertisements. The entered data is a sample of demographic data. And hence, is crucial for many data analytic purposes.
  • Furthermore, in the field of marketing, advertising, telemarketing, and the like, before the incorporation of Do-Not-Disturb (DND) services by telecommunication service providers, telemarketers could call up phone owners in order to telemarket their product or services. However, with regulations in place in relation to DND services, it has become increasingly difficult for the marketing industry to target potential customers or clients or users. Hence, there is a need for a system which initiates proactive calling from a user or customer or client in a secure and warranted manner.
  • Online mechanisms include advertisements which target potential users, customers, clients or the like. These advertisements may be placed at various locations such as search engines pages, social media sites, private websites or the like. Each advertisement attracts fees from the host site. However, in the event that an advertisement generates potential leads, an advertiser rarely comes to know the source of the advertisement or the placement of the advertisement which has led to the generation of potential lead(s). Hence, there is a need for a system which provides such information for the purposes of statistics and analytics.
  • OBJECTS OF THE INVENTION
  • An object of the invention is to provide a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism.
  • Another object of the invention is to provide a system and method for tracking a user using a system for data entering and submission for an online interface using a remote entering/submitting mechanism.
  • Yet another object of the invention is to provide a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism and a biometric identity system.
  • Still another object of the invention is to provide a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism in an encrypted and authorized manner.
  • An additional object of the invention is to provide a system and method for tracking a user using a system for data entering and submission for an online interface using a remote entering/submitting mechanism in an encrypted and authorized manner.
  • SUMMARY OF THE INVENTION
  • According to this invention, there is provided a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism.
  • According to this invention, there is provided a system and method for tracking a user using a system for data entering and submission for an online interface using a remote entering/submitting mechanism.
  • According to this invention, there is provided a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism and a biometric identity system.
  • According to this invention, there is provided a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism in an encrypted and authorized manner.
  • The system and method of this invention is a new online approach to data submission, user or data authentication with the following key features:
      • 1. The invention aims to provide the user systems and methods for ‘Allowing a user to input or submit data into a form or a data input interface on an online interface by way of an offline communication made through a separate communication device.’ The offline communication made is preferably a phone call, but may suitably be replaced by a convenient substituent mode of communication such as but not limited to SMS or email.
      • 2. The invention also includes a feature of using a mode of user/data authentication or verification, using biometric identity related code of a user, which is preferably voice based ID.
      • 3. The authentication process may further be subjected to a process of encryption, for added security to the said process.
  • According to an embodiment of the invention, there is a system for data entering and submission for an online interface using a remote entering/submitting mechanism, said system comprising:
      • a. at least one data entry field in an online interface;
      • b. a remote entering/submitting mechanism comprising:
        • i. a pointer generating or retrieving system adapted to generate a pointer data to be displayed on the online interface;
        • ii. a central interface system adapted to receive a communication linked to a pointer data from an electronic device;
        • iii. a pre-populated database comprising one or more pointer data which are pre-defined; and
        • iv. a central database adapted to store correlative information in relation to one or more pre-defined pointer data; and
      • c. a submission component capable of submitting data after receiving the communication from the electronic device;
        • wherein the data is submitted by the submission component, when a user communicates a pointer data displayed on the online interface to the central interface system via the electronic device; and
      • wherein there is no clickable submit button on the online interface;
      • and wherein there is no other means of allowing a user to enter/submit the data on the said online interface;
      • and wherein data shall not be submitted by the submission component unless the pointer data has been communicated to the central interface system by the user using the electronic device through a medium/interface other than the said online interface.
  • According to this invention, there is a system for data entering and submission for an online interface using a remote entering/submitting mechanism, said system comprising:
      • a. at least one data entry field in an online interface system;
      • b. remote entering/submitting mechanism comprising a device for facilitating the remote entry or remote submission;
      • c. remote entering/submitting mechanism further comprising a pointer generating system adapted to generate pointer data to be displayed on the online interface system;
      • d. pre-populated database comprising pointer data which are pre-defined for the use of the system of this invention;
      • e. remote entering/submitting mechanism still further comprising a central interface system adapted to receive communication from the device in response to generated pointer data;
      • f. central interface system further comprising an acknowledgement means adapted to acknowledge communication from a device in relation to a generated pointer; and
      • g. remote entering/submitting mechanism additionally further comprising a central database adapted to store correlative information in relation to various types of pre-defined pointer data.
  • According to this invention, there is also provided a method for data entering and submission for an online interface using a remote entering/submitting mechanism, said method comprising the steps of
      • a. entering data in a data entry field in an online interface system by a user;
      • b. generating or retrieving a pointer data by a pre-populated database to be displayed on the online interface system;
      • c. displaying the pointer data on the online interface system;
      • d. receiving a communication linked to a pointer data from an electronic device, by a central interface system; and
      • e. submitting data after receiving the communication from the electronic device by a submission component;
        wherein there is no clickable submit button on the online interface; and wherein there is no other means of allowing a user to enter/submit the data on the said online interface;
        and wherein data shall not be submitted by the submission component unless the pointer data has been communicated to the central interface system by the user using the electronic device through a medium/interface other than the said online interface.
  • According to this invention, there is also provided a method for data entering and submission for an online interface using a remote entering/submitting mechanism, said method comprising the steps of:
      • a. entering data in a data entry field in an online interface system by a user;
      • b. providing a remote entering/submitting mechanism comprising a device for facilitating the remote entry or remote submission;
      • c. generating/retrieving pointer data to be displayed on the online interface system;
      • d. pre-populating a database comprising pointer data which are pre-defined for the use of the method;
      • e. receiving communication from the device in response to generated pointer data;
      • f. acknowledging communication from a device in relation to a generated pointer; and
      • g. storing correlative information in relation to various types of pre-defined pointer data.
  • According to this invention, there is also provided an encryption system and method adapted to encrypt communication employed with the system for data entering and submission for an online interface using a remote entering/submitting mechanism, said system comprising:
      • a. a first input means adapted to allow a user to input an identity;
      • b. a second input means adapted to allow an input of a voice data in the user's own voice;
      • c. a unique code generation means adapted to generate a unique code whenever a user generates a request for communication, said unique code is being generated by an encryption algorithm which receives the first input data and the second input data, said unique code being a derivative of the first input data and the second input data in correlation with the parameters defined by the encryption algorithm for encrypting;
      • d. a database of generated unique codes in encrypted manner in order to reference a user for all authorization;
      • e. a computation means adapted to create/retrieve a verification code in accordance with the code that is to be received from the user for the purpose of matching; and
      • f. a matching means for matching the input data or verification code created by the computation means.
  • In an embodiment of this invention, the second input means is adapted to allow an input of a data other than voice data such as but not limited to a pin, a code, an OTP or a T-Pin.
  • According to this invention, there is provided a method for data entering and submission for an online interface using a remote entering/submitting mechanism, wherein said method further comprises a method adapted to encrypt communication comprising the steps of:
      • a. inputting an identity as a first input data by a user by a first input means;
      • b. inputting a voice data in the user's own voice as a second input data by a second input means;
      • c. generating a unique code by a unique code generation means whenever the user generates a request for a communication, said unique code being generated by an encryption algorithm which receives the first input data and the second input data, said unique code being a derivative of the first input data and the second input data in correlation with parameters defined by the encryption algorithm for encrypting;
      • d. storing the generated unique codes in encrypted manner in order to reference a user for all authorization in a database;
      • e. creating/retrieving a verification code in accordance with the code that is to be received from the user for purposes of matching by a computation means; and
      • f. matching the verification code or first input data by a matching means.
  • According to this invention, there is also further provided an encryption method and method adapted to encrypt communication, said method comprising the steps of:
      • a. a first step of allowing a user to input an identity;
      • b. a second step of allowing a user to input a voice data in the user's own voice;
      • c. generating a unique code whenever a user generates a request for communication, said unique code being generated by an encryption algorithm which receives the first input data and the second input data, said unique code being a derivative of the first input data and the second input data in correlation with the parameters defined by the encryption algorithm for encrypting;
      • d. storing generated unique codes in encrypted manner in order to reference a user for all authorization; and
      • e. creating a verification code in accordance with the code that is to be received from the user for the purposes of matching.
  • According to this invention, there is also further provided a computer program product for data entering and submission for an online interface using a remote entering/submitting mechanism, the computer program product embodied in a computer readable medium that, when executing on a computer, performs steps comprising
      • a. entering data in a data entry field in an online interface system by a user;
      • b. providing a remote entering/submitting mechanism comprising a device for facilitating the remote entry or remote submission;
      • c. generating/retrieving pointer data to be displayed on the online interface system;
      • d. pre-populating a database comprising pointer data which are pre-defined for the use of the method;
      • e. receiving communication from the device in response to generated pointer data;
      • f. acknowledging communication from a device in relation to a generated pointer; and
      • g. storing correlative information in relation to various types of pre-defined pointer data.
    DETAILED DESCRIPTION OF THE INVENTION
  • According to this invention, there is provided a system and method for data entering and submission for an online interface using a remote entering/submitting mechanism.
  • FIG. 1 illustrates a schematic of the system for data entering and submission for an online interface using a remote entering/submitting mechanism.
  • In accordance with an embodiment of this invention, there is provided at least one data entry field (12) in an online interface system (10). The entry mechanism to the data entry field is a routine entry mechanism selected from a group of devices comprising a keyboard, a mouse, a gesture device, a touch interface device, a pointer device, a stylus and interface device, and the like.
  • In accordance with another embodiment of this invention, there is provided a remote entering/submitting mechanism (20). This remote entering/submitting mechanism includes or involves a device (22) for facilitating the remote entry or remote submission. This device may be one selected from a group consisting of a phone, a cell phone, a mobile phone or any phone or telecommunication enabled data entry device or any Internet enabled data entry device or any wireless communication based data entry device or wired communication based data entry device.
  • In accordance with another embodiment of this invention, the device (22) may be the same as the device used for facilitating the entry mechanism to the at least one data entry field (12) in an online interface (10).
  • In accordance with another embodiment of this invention, the device (22) may not be the same as the device used for facilitating the entry mechanism to the at least one data entry field (12) in an online interface (10).
  • In accordance with another embodiment of this invention, the remote entering/submitting mechanism (20) comprises a pointer generating system (24) adapted to generate or retrieve pointer data (14) to be displayed on the online interface system (10). This pointer data for example may be a telephone number to which a call is to be made or a number to which a message is to be sent or an identity to which internet based or telecommunication based data is to be sent from the device (22). This pointer is generated or selected from a list of numbers, selected from a pre-populated database (26), which are pre-defined for the use of the system of this invention. This pointer may also be generated or selected from a list of identities (such as e-mail identities or messaging identities), selected from a pre-populated database (26), which are pre-defined for the use of the system of this invention. The ‘pointer’ may be a combination of alphanumeric characters or other symbols which may represent a specific identifiable characteristic such as but not limited to a telephone number, a mobile number, SMS Keyword, Short Code, extension number, numerical input after connecting to a call, email ID, PIN (personal identification number) number, TIN (Telephone Identification Number), a URL (uniform resource locator), or a combination thereof. The pointer or pointer data may also be a coded means such as but not limited to a QR code (Quick Response Code), a hint or secret question, a captcha enabled access, an image, a sound or music based communication, a puzzle or a hint statement.
  • In accordance with another embodiment of this invention, a pointer may be distinct and unique in association to a pointer parameter, such that a pointer is used to indicate and identify the pointer parameter. The pointer parameter for example may be the particular webpage where the pointer is displayed, geographical location of a user, time of display and other such identifiable parameters which are particularly used for user tracking or user verification or user authentication. The pointers may be continuously distinct in association to a pointer parameter or may be reused or recycled from time to time or in the form of sessions, such that at a given instant of time or session every pointer is unique to a pointer parameter irrespective of whether the pointer was associated to the same or different pointer parameter in a previous period of time or session, which is not valid or live at the said given instant of time or session.
  • In accordance with yet another embodiment of this invention, the remote entering/submitting mechanism (20) comprises a central interface system (30) adapted to receive communication from the device (22) in response to generated pointer data. The central interface system (30) may further comprise an acknowledgement means (32) adapted to acknowledge communication from a device (22) in relation to a generated pointer. This acknowledgement means may include an Interactive Voice Response means. Interactive Voice Response (IVR) is an electronic system that provides voice response to a user's query initiated via telephone and any remote communication device. Conventional IVR solution comprises a computer with IVR software. The acknowledgement means may include a means (34) for prompting a user to annunciate a data, preferably a text data. The text data may be any random text data generated by the system or may be a voice captcha or the like. Further, it may include a biometric identity system (36) adapted to recognize voice of a user for acknowledging submission. It is to be understood that the biometric identity system is trained during initialization to recognize a user's voice and the trained set of data and parameters is securely stored and recalled as and when the biometric identity system (36) of a recognized or pre-registered user is activated.
  • In accordance with still another embodiment of this invention, the remote entering/submitting mechanism (20) comprises a central database (26) adapted to store correlative information in relation to various types of pre-defined pointer data. According to a non-limiting exemplary embodiment, a first type of pointer data may relate to a pre-defined mobile number for acknowledgement means (32), said first type of pointer data adapted to be generated if a user lands on the online interface by directly typing in the URL of the online interface in a browser's address bar. According to a non-limiting exemplary embodiment, a second type of pointer data may relate to a pre-defined mobile number for acknowledgement means (32), said second type of pointer data adapted to be generated if a user lands on the online interface by clicking on an advertisement on any web-site, mobile site, mobile app or search engine results' page or any digital property connected via internet, intranet or network. According to a non-limiting exemplary embodiment, a third type of pointer data may relate to a pre-defined mobile number for acknowledgement means (32), said third type of pointer data adapted to be generated if a user lands on the online interface by clicking an advertisement on another webpage. According to a non-limiting exemplary embodiment, a fourth type of pointer data may relate to a pre-defined e-mail identity for acknowledgement means (32), said fourth type of pointer data adapted to be generated if a user lands on the online interface by directly typing in the URL of the online interface in a browser's address bar. Such and further various types of pointer data may be defined and stored in the central database (26) so that information in relation to usage for data analytics and statistics may be collated. Further, various data analytic means and various statistical and correlation means may be employed in relation to the various embodiments of the system and method of this invention.
  • In accordance with an embodiment of the invention, the submission of data enabled by submission component is enabled and said data is submitted to a data submission server.
  • In accordance with still another embodiment of this invention, a single server or a central server may comprise one or more databases of the current system.
  • In accordance with an embodiment of the invention, data submission server may or may not be a part of a central server.
  • In accordance with an embodiment of the invention, the pointer or pointer data may be same for multiple sessions simultaneously.
  • In accordance with an embodiment of the invention, the pointer or pointer data may be different for each of multiple sessions simultaneously.
  • In accordance with an embodiment of this invention, the said system further comprises of a system for allowing a user to input or submit data into a form or a data input interface on an online interface by way of an offline communication made through a separate communication device, wherein the offline communication made is a communication selected from a group comprising a phone call, an SMS, an MMS, electronic communication, a an email, and a combination thereof.
  • In accordance with an embodiment of this invention, the method for data entering and submission for an online interface using a remote entering/submitting comprising receiving a communication linked to a pointer data from an electronic device, by a central interface system is enabled by an offline communication made through a separate communication device, wherein the offline communication made is a communication including a phone call, a SMS, a MMS, electronic communication, a an email, and a combination thereof.
  • The data in the text fields or data entry field may be submitted using various pointer data that is generated and with the aid of the remote entering/submitting mechanism using the generated pointer data to perform the act of entering/submitting. Thus, unique identity of the remote entering/submitting mechanism may be captured by the central interface system. The user is prompted to connect to the central interface system, proactively, by means of the remote entering/submitting mechanism and by using the generated pointer data. Such unique identity may be unique to a user or unique to a session. Such unique identity may or may not be stored in the system.
  • According to this invention, there is also provided an encryption system and method adapted to encrypt communication. The communication may be any data communication over a wired communication channel, a wireless communication channel, a telecommunication communication channel, an Internet communication channel, a network communication channel, or the like. The encryption system provides a solution for a safe and secure authentication system and method. Also, this invention provides an encryption system and method for data entering and submission for an online interface using a remote entering/submitting mechanism in an encrypted and authorized manner.
  • FIG. 2 illustrates a schematic of the encryption system adapted to encrypt communication.
  • In accordance with en embodiment of this invention, there is provided a first input means (102) adapted to allow a user to input an identity. The identity is a user-generated identity. This identity without limitation may be a text based identity. This identity may or may not be stored by the system of this invention.
  • In accordance with another embodiment of this invention, there is provided a second input means (104) adapted to allow an input of a voice data in the user's own voice. A user may be prompted to speak in to an audio receipt component of the system. A voice detection mechanism identifies/extracts key parameters from the received voice data in order to determine the uniqueness of the voice data and the corresponding user.
  • Alternatively, each user may be provided with a specific user-defined or system-defined text data which is unique to the user. The system may be trained only to receive the user-defined or system-defined text or any data in the voice of the user, in full or in part, in order to recognize a user.
  • In accordance with an additional embodiment of this invention, there is provided a unique code generation means (110) adapted to generate a unique code whenever a user generates a request for communication. The unique code is generated by an encryption algorithm which receives the first input data and the second input data. The unique code is a derivative of the first input data and the second input data in correlation with the parameters defined by the encryption algorithm for encrypting. This unique code generation means is a real time unique code generation means which generates the unique code in real time. The real time unique generated code may be an alphanumeric code. The real time unique generated code may be a voice captcha code based on previously stored or trained second registration data. The generated unique code may be stored in a database (116) in encrypted manner in order to reference a user for all authorization.
  • The system uses this real time unique code for storage and verification, while the first input data and the second input data is not stored anywhere in the system or the database (116), and every time a real time unique code will be generated, temporarily stored and verified in encrypted manner for authorization. This ensures protection from hacking or reverse engineering.
  • In accordance with yet an additional embodiment of this invention there may be provided a computation means (112) adapted to create a verification code in accordance with the code that is to be received from the user for the purposes of matching. This verification code is also the same combination that the unique code generation means (110) intends to create. This verification code may be generated in real time.
  • The data, in each of the means of the system and method of this invention, may be ‘encrypted’ and suitably ‘decrypted’ as and when required.
  • In an embodiment of the invention, the systems and methods of the present invention are made applicable to a do-not-disturb (DND) mode registry or a do-not-disturb mode enabled device.
  • In an embodiment of the invention, the systems of the present invention comprise a do-not-disturb mode detection component, which may be linked to a do-not-disturb registry.
  • In an embodiment of the invention, the methods of the present invention comprise the step of identifying whether an electronic device is enabled or activated with a DND mode.
  • In an embodiment of the invention, the absence of clickable submit button or other means of allowing a user to enter/submit the data on the said online interface, induces a user to voluntarily establishing communication with a vendor or caller thereby circumventing the restriction created by DND mode.
  • The term ‘do-not-disturb’ (DND) or DND mode means a mode activated on a telecommunication device which prevents communication to the said device by a set of vendors or callers, said vendors or callers typically intending to initiate communication with consumers in general for commercial or advertising purposes. The said communication is typically telephonic calls or instant messages or SMS. The term ‘do-not-disturb’ can be alternately used instead of the term ‘do-not-call’. Any registry indexing one or more of such DND mode activated telecommunication devices may be referred to as a DND Registry. A DND Registry is deemed to include a ‘Customer Call Preference Registry’ or a ‘Do not Call’ registry.
  • In an embodiment of the invention, the systems of the present invention further comprise a parallel communication triggering component. The parallel communication triggering component is capable of initiating a communication between the user of the system and a second person or second system such as but not limited to a telecommunication system or an Interactive voice response system (IVR), said communication being initiated either before or during or after the step of submission of data is being enabled. In an embodiment of the invention, said communication may be made by employing a pointer parameter to determine the second person or second system to which the communication is being made.
  • In an embodiment of the invention, the systems and methods of the present invention may allow a parallel communication triggering based on the pointer data or pointer parameter of the first level of data, and may be triggered prior to or simultaneous to or subsequent to the submission of data by submission component.
  • In an embodiment of the invention, the systems and methods of the present invention may identify or authenticate or store or match a voice print. A voice print may be a graphic representation of a person's voice, showing the component frequencies as analyzed by a sound spectrograph.
  • In an embodiment of the invention, the systems and methods of the present invention may involve or be coupled with or incorporate additional systems or methods for user tracking. For the purpose of this invention, ‘user tracking’ or ‘tracking a user’ involves tracking of or recording of or storing and transferring data of activities or behavior or preferences or intent of a user. Examples of activities may be selected from but not limited to series of clicks, access of links, access of advertisements, shopping activities, downloading of information, uploading of information, social network activities, RSS Feeds Subscription. Preference of a user may be derived from the history of user activity or the user profile details. Intent of a user may be a prediction of the interest or requirement of a user based on an algorithm for enabling such prediction. Based on user tracking, the pointer parameter may be designated. Also, the system may further comprise of a ‘user tracking data transfer component’ which is capable of transferring or submitting user tracking data to the data submission server. User tracking can in turn be used to facilitate ‘advertisement tracking’ which shall enable derivation of analytics or details or performance measuring of one or more advertisements linked directly or indirectly to user tracking.
  • In an embodiment of the invention, the systems and methods of the present invention may involve or be coupled with or incorporate additional systems or methods for Ecommerce user Credit Rating or Ecommerce User Credit Rating Registry. The term ‘Ecommerce User Credit Rating’ shall mean a rating or grading or credibility points assigned to an identity such as but not limited to name, telephone no, email address, registration number or the like, based on a person's activity pattern or default pattern or fraud pattern in respect of payment delays or payment defaults for either partial payments or full payments or repeated instances of try & return of goods, wherein pattern may be data linked to a series of activities. This may extend to Cash on Delivery systems or Collect on Delivery systems or Try & Return schemes.
  • In an embodiment of the invention, the systems and methods of the present invention may involve or be coupled with or incorporate additional systems or methods for Unethical User Tracking System (UEUTS).
  • In an embodiment of the invention, the systems and methods of the present invention may involve or be coupled with or be linked to any registry.
  • The term ‘pre-defined’ with respect to a component or data or item or program means that a particular identity or indicia is defined at an instant prior to the instant of using the component or data or item or program.
  • The term ‘pre-registered’ with respect to a component or data or item or program means that indexing or registration of the component or data or item or program is done at an instant prior to the instant of using the component or data or item or program.
  • The term ‘pre-populated’ with respect to a component or data or item or program means that clustering or clubbing or populating of the component or data or item or program is done at an instant prior to the instant of using the component or data or item or program.
  • The terms ‘pointer’ and ‘pointer data’ can be alternatively and interchangeably used for the purpose of this invention.
  • In accordance with an embodiment of this invention, data entering and submission is a means to input data as well as access data.
  • The systems of the present invention in an embodiment are made accessible through a portal or an interface which is a part of, or may be connected to, the internet or World Wide Web or any similar portal, wherein the portals or interfaces are accessed by one or more of users through an electronic device, whereby the user may send and receive data to the portal or interface which gets stored in at least one memory device or at least one data storage device or at least one server, and utilizes at least one processing unit. The portal or interface in combination with one or more of memory device, data storage device, processing unit and serves, form an embedded computing setup, and may be used by, or used in, one or more of a computer program product. In an embodiment of the invention, the embedded computing setup and optionally one or more of a computer program product, in relation with, and in combination with the said portal or interface forms one of the systems of the invention. Typical examples of a portal or interface may be selected from but is not limited to a website, an executable software program or a software application.
  • In an example of the invention, a user through a personal computer fills a web page based online enquiry form with the details of his name, contact details and enquiry summary on a commercial website but cannot submit the data by using any key on the keyboard of his personal computer, nor is a clickable submitted button allowed on the webpage. The webpage displays a pointer data in the form of a telephone number to which the user is required to call. The user calls the telephone number through his mobile phone, and the pointer data is communicated to the central interface system, and the submission component submits the said online enquiry form remotely.
  • In an example of the invention, a user through a personal computer fills a web page based online enquiry form with the details of his name, contact details and enquiry summary on a commercial website but cannot submit the data by using any key on the keyboard of his personal computer, nor is a clickable submitted button allowed on the webpage. The webpage displays a pointer data in the form of a keyword to be sent via a text message or SMS to a telephone number by the user. The user sends a text message containing the keyword to the telephone number through his mobile phone, and the pointer data is communicated to the central interface system, and the submission component submits the said online enquiry form remotely.
  • In an example of the invention, a user through a personal computer fills a web page based online enquiry form with the details of his name, contact details and enquiry summary on a commercial website but cannot submit the data by using any key on the keyboard of his personal computer, nor is a clickable submitted button allowed on the webpage. The webpage displays a pointer data in the form of a QR Code to be scanned and sent to an email address by the user. The user sends an email containing the scanned QR code through by opening another webpage containing email interface on the personal computer and the pointer data is communicated to the central interface system, and the submission component submits the said online enquiry form remotely.
  • In an example of the invention, a user through a personal computer fills a web page based online enquiry form with the details of his name, contact details and enquiry summary on a commercial website but cannot submit the data by using any key on the keyboard of his personal computer, nor is a clickable submitted button allowed on the webpage, as soon as the system identifies that the user's phone is activated with DND Mode. The webpage displays a pointer data in any of the forms mentioned in the above examples.
  • In an example of the invention, a user while logging into his email interface is required to first enter his login ID then authenticate himself/herself by voice enabled password, which acts as the pointer data and shall trigger remote submission and authentication of the user to allow access to his/her email interface. The webpage displays a pointer data in the form of a telephone number to which the user is required to call and speak a word in his own voice. The user calls the said telephone number and speaks the word in his own voice, which is encrypted using the encryption mechanism of one of the embodiments of the system and then matched and authenticated to allow the submission of the entered data and allow access of the email interface to the user. If the user speaks a wrong word or a person other than the user speaks a word in the call to the telephone number, then the further process will cease and user will be denied access to email interface.
  • In an embodiment of the invention, the systems and methods of the invention may simultaneously involve more than one user or more than one data storage device or more than one host server or any combination thereof.
  • In an embodiment of the invention, a user may provide user input through any suitable input device or input mechanism such as but not limited to a keyboard, a mouse, a joystick, a touchpad, a virtual keyboard, a virtual data entry user interface, a virtual dial pad, a software or a program, a scanner, a remote device, a microphone, a webcam, a camera, a fingerprint scanner, pointing stick, or any combination thereof.
  • In an embodiment of the invention, the systems and methods can be practiced using any electronic device which may be connected to one or more of other electronic device with wires or wirelessly which may use technologies such as but not limited to, Bluetooth, WiFi, Wimax. This will also extend to use of the aforesaid technologies to provide an authentication key or access key or electronic device based unique key or any combination thereof.
  • In an embodiment of the invention, the systems and methods can be practiced using any electronic device which may contain or may be infected by one or more of an undesirable software such as but not limited to a virus, or a Trojan, or a worm, malware, spyware, adware, scareware, crimeware, rootkit or any combination thereof.
  • In an embodiment of the invention the system may involve software updates or software extensions or additional software applications.
  • In an embodiment of the invention one or more user can be blocked or denied access to one or more of the aspects of the invention.
  • The term ‘encrypt’ or ‘encryption’ means the process of converting digital information into a new form using a key or a code or a program, wherein the new form is unintelligible or indecipherable to a user or a thief or a hacker or a spammer. The term ‘encryption’ includes encoding, compressing, or any other translating of the digital content. The encryption of the digital media content is performed in accordance with an encryption/decryption algorithm. The encryption/decryption algorithm utilized is not hardware dependent and may change depending on the digital content. For example, a different algorithm may be utilized for different websites or programs. The term ‘encryption further includes one or more aspects of authentication, entitlement, data integrity, access control, confidentiality, segmentation, information control, and combinations thereof.
  • The described embodiments may be implemented as a system, method, apparatus or article of manufacture using standard programming and/or engineering techniques related to software, firmware, hardware, or any combination thereof. The described operations may be implemented as code maintained in a “computer readable medium”, where a processor may read and execute the code from the computer readable medium. A computer readable medium may comprise media such as magnetic storage medium (e.g., hard disk drives, floppy disks, tape, etc.), optical storage (CD-ROMs, DVDs, optical disks, etc.), volatile and non-volatile memory devices (e.g., EEPROMs, ROMs, PROMs, RAMs, DRAMs, SRAMs, Flash Memory, firmware, programmable logic, etc.), etc. The code implementing the described operations may further be implemented in hardware logic (e.g., an integrated circuit chip, Programmable Gate Array (PGA), Application Specific Integrated Circuit (ASIC), etc.). Still further, the code implementing the described operations may be implemented in “transmission signals”, where transmission signals may propagate through space or through a transmission media, such as an optical fiber, copper wire, etc. The transmission signals in which the code or logic is encoded may further comprise a wireless signal, satellite transmission, radio waves, infrared signals, Bluetooth, etc. The transmission signals in which the code or logic is encoded is capable of being transmitted by a transmitting station and received by a receiving station, where the code or logic encoded in the transmission signal may be decoded and stored in hardware or a computer readable medium at the receiving and transmitting stations or devices. An “article of manufacture” comprises computer readable medium, hardware logic, and/or transmission signals in which code may be implemented. A device in which the code implementing the described embodiments of operations is encoded may comprise a computer readable medium or hardware logic. Of course, those skilled in the art will recognize that many modifications may be made to this configuration without departing from the scope of the present invention, and that the article of manufacture may comprise suitable information bearing medium known in the art.
  • In an embodiment of the invention the term network means a system allowing interaction between two or more electronic devices, and includes any form of inter/intra enterprise environment such as the world wide web, Local Area Network (LAN), Wide Area Network (WAN), Storage Area Network (SAN) or any form of Intranet.
  • In an embodiment of the invention, the systems and methods can be practiced using any electronic device. An electronic device for the purpose of this invention is selected from any device capable of processing or representing data to a user and providing access to a network or any system similar to the internet, wherein the electronic device may be selected from but not limited to, personal computers, mobile phones, laptops, palmtops, portable media players and personal digital assistants.
  • In an embodiment of the invention, computer program code for carrying out operations or functions or logic or algorithms for aspects of the present invention may be written in any combination of one or more programming languages which are either already in use or may be developed in future, such as but not limited to Java, Smalltalk, C++, C, Foxpro, Basic, HTML, PHP, SQL, Javascript, COBOL, Extensible Markup Language (XML), Pascal, Python, Ruby, Visual Basic .NET, Visual C++, Visual C# .Net, Python, Delphi, VBA, Visual C++ .Net, Visual FoxPro, YAFL, XOTcI, XML, Wirth, Water, Visual DialogScript, VHDL, Verilog, UML, Turing, TRAC, TOM, Tempo, Tcl-Tk, T3X, Squeak, Specification, Snobol, Smalltalk, S-Lang, Sisal, Simula, SGML, SETL, Self, Scripting, Scheme, Sather, SAS, Ruby, RPG, Rigal, Rexx, Regular Expressions, Reflective, REBOL, Prototype-based, Proteus, Prolog, Prograph, Procedural, PowerBuilder, Postscript, POP-11, PL-SQL, Pliant, PL, Pike, Perl, Parallel, Oz, Open Source, Occam, Obliq, Object-Oriented, Objective-C, Objective Caml, Obfuscated, Oberon, Mumps, Multiparadigm, Modula-3, Modula-2, ML, Miva, Miranda, Mercury, MATLAB, Markup, m4, Lua, Logo, Logic-based, Lisp (351), Limbo, Leda, Language-OS Hybrids, Lagoona, LabVIEW, Interpreted, Interface, Intercal, Imperative, IDL, Icl, ICI, HyperCard, HTMLScript, Haskell, Hardware Description, Goedel, Garbage Collected, Functional, Frontier, Fortran, Forth, Euphoria, Erlang, ElastiC, Eiffel, E, Dylan, DOS Batch, Directories, Declarative, Dataflow, Database, D, Curl, C-Sharp, Constraint, Concurrent, Component Pascal, Compiled, Comparison and Review, Cocoa, CobolScript, CLU, Clipper, Clean, Clarion, CHILL, Cecil, Caml, Blue, Bistro, Bigwig, BETA, Befunge, BASIC, Awk, Assembly, ASP, AppleScript, APL, Algol 88, Algol 60, Aleph, ADL, ABEL, ABC, or similar programming languages.
  • The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude or rule out the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
  • The process steps, method steps, algorithms or the like may be described in a sequential order, such processes, methods and algorithms may be configured to work in alternate orders. In other words, any sequence or order of steps that may be described does not necessarily indicate a requirement that the steps be performed in that order. The steps of processes described herein may be performed in any order practical. Further, some steps may be performed simultaneously, in parallel, or concurrently.
  • In addition to the embodiments and examples shown, numerous variants are possible, which may be obvious to a person skilled in the art relating to the aspects of the invention.
  • In an embodiment of the invention, the algorithm or logic or program or code associated with encryption systems and methods may be maintained in a device which is separate from the device or server in which the encryption systems and methods are enabled.
  • In an embodiment of the invention the systems and methods of the present invention can be used and made applicable for any online or network based activities such as but not limited to monetary transactions, online shopping, social networks, emails, chatting, on-line gaming sessions, messaging, multimedia-conferencing, application-sharing, e-voting, group-ware & collaboration, blogging, or any combination thereof.
  • In an embodiment of the invention, the algorithm used for encryption may have the following formula:

  • ALG=ALG1(op1)ALG2(op2)ALG3 . . . (opN)ALGN+1,
  • where ALG stands for an algorithm which may be a single set of instruction that may be enabled using a computer language n=1 to infinity and “op” stands for a functional operator including but not limited to logical operator or mathematical operator or comparative operator or string based operator, data and time operators.
  • In an embodiment of the invention, the encryption algorithm may be different for different systems.
  • In an embodiment of the invention, any action or process related to the systems and methods in accordance with the present invention, may execute entirely on a user's computing device, partly on a user's computing device, as a stand-alone software package, partly on a user's computing device and partly on a remote computing device or entirely on the remote computer or a server.
  • In an embodiment of the invention a user input is anything or any data or metadata provided by a user actively and with the users knowledge in the form of one or more alphabets or characters or any string or any computer program or any computer file.
  • In an embodiment of the invention, the systems and methods of the present invention may involve and provide methods to run self check, trouble shooting or program debugging.
  • A user is any person, machine or software that uses or accesses one or more of the systems or methods of the present invention. A user includes an automated computer program and a robot.
  • In an embodiment of the invention, the said code may have a combination of numeric or alphanumeric or symbolic characters used for protected and restricted access provided to a user to one or more digital systems or function or data, provided after necessary authentication or identification of the user.
  • In an embodiment of the invention, the encryption mechanism can be used by enabling a plugin or application or an icon or a bookmark on a website or a software or any graphical user input that is used for the systems and methods in accordance with the present invention.
  • In an embodiment of the invention, the encryption mechanism further comprises of one or more components which can be combined with one or more of other components of the mechanism in any combination, in an encrypted or unencrypted state, to generate an encryption key.
  • In an embodiment of the invention, the systems and methods can be practiced using any electronic device. An electronic device for the purpose of this invention is selected from any device capable of processing or representing data to a user and providing access to a network or any system similar to the internet, wherein the electronic device may be selected from but not limited to, personal computers, mobile phones, laptops, palmtops, portable media players and personal digital assistants.
  • In an embodiment of the invention, the systems and methods of the present invention provides or enables a user interface which may allow commands for a command line interface and/or a graphical user interface (GUI) enabling a user to create, modify and delete data or metadata or program or logic or algorithm or parameters associated with encryption method or encryption program or encryption language.
  • In an embodiment of the invention, the system may involve software updates or software extensions or additional software applications.
  • In an embodiment of the invention, any form of internet security such as but not limited to, a firewall or antivirus or antimalware or registry protection can be used by a user in the same or different electronic device either simultaneously or separately, along with the systems or methods of the present invention.
  • In an embodiment of the invention, one or more user can be blocked or denied access or be required to reattempt access, to one or more of the aspects of the invention.
  • In an embodiment of the invention, a user may have a system to record or send alert or be informed in case any other user is accessing the user's electronic device remotely.
  • In an embodiment of the invention, the systems and methods of the invention may simultaneously involve more than one user or more than one data storage device or more than one host server or any combination thereof.
  • In an embodiment of the invention, the systems and methods of the present invention are used to prevent or restrict hacking or related phenomenon such as but not limited to phishing, man in the middle attack, inside jobs, rogue access points, back door access, use of viruses and worms, use of trojan horses, denial of service attack, sniffing, spoofing, ransomware or any combination thereof.
  • While this description has disclosed certain specific embodiments of the present invention for illustrative purposes, various modifications will be apparent to those skilled in the art which do not constitute departures from the spirit and scope of the invention as defined in the following claims, and it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the invention and not as a limitation.

Claims (26)

1. A system for data entering and submission for an online interface using a remote entering/submitting mechanism, said system comprising:
a. at least one data entry field in an online interface;
b. a remote entering/submitting mechanism comprising:
i. a pointer generating or retrieving system adapted to generate a pointer data to be displayed on the online interface;
ii. a central interface system adapted to receive a communication linked to a pointer data from an electronic device;
iii. a pre-populated database comprising one or more pointer data which are pre-defined; and
iv. a central database adapted to store correlative information in relation to one or more pre-defined pointer data; and
c. a submission component capable of submitting data after receiving the communication from the electronic device;
wherein the data is submitted by the submission component, when a user communicates a pointer data displayed on the online interface to the central interface system via the electronic device; and
wherein there is no clickable submit button on the online interface;
and wherein there is no other means of allowing a user to enter/submit the data on the said online interface;
and wherein data shall not be submitted by the submission component unless the pointer data has been communicated to the central interface system by the user using the electronic device through a medium/interface other than the said online interface.
2. The system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 1, wherein the said system further comprises of:
a. a first input means adapted to allow a user to input an identity entered through said at least one data entry field in an online interface, as a first input data;
b. a second input means adapted to allow the user to input a voice data in the user's own voice entered through an electronic device, as a second input data;
c. a unique code generation means adapted to generate a unique code whenever the user generates a request for the communication, said unique code being generated by an encryption algorithm which receives the first input data and the second input data, said unique code being a derivative of the first input data and the second input data in correlation with parameters defined by the encryption algorithm for encrypting;
d. a database of generated unique codes in encrypted manner in order to reference a user for all authorization;
e. a computation means adapted to create/retrieve a verification code in accordance with the code that is to be received from the user for the purpose of matching; and
f. a matching means for matching the input data or verification code created by the computation means.
3. The system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 1, further comprising:
a. a device for facilitating the remote entry or remote submission; and
b. an acknowledgement means adapted to acknowledge the communication from the electronic device in relation to the generated pointer.
4. A method for data entering and submission for an online interface using a remote entering/submitting mechanism, the method comprising the steps of:
a. entering data in a data entry field in an online interface system by a user;
b. generating or retrieving a pointer data by a pre-populated database to be displayed on the online interface system;
c. displaying the pointer data on the online interface system;
d. receiving a communication linked to a pointer data from an electronic device, by a central interface system; and
e. submitting data after receiving the communication from the electronic device by a submission component;
wherein there is no clickable submit button on the online interface;
and wherein there is no other means of allowing a user to enter/submit the data on the said online interface;
and wherein data shall not be submitted by the submission component unless the pointer data has been communicated to the central interface system by the user using the electronic device through a medium/interface other than the said online interface.
5. The method for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 4, further comprising the steps of:
a. acknowledging the communication from the electronic device in relation to the generated pointer; and
b. storing of correlative information in relation to various types of pre-defined pointer data.
6. The method for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 4, wherein said method further comprises a method adapted to encrypt communication comprising the steps of:
a. inputting an identity as a first input data by a user by a first input means;
b. inputting a voice data in the user's own voice as a second input data by a second input means;
c. generating a unique code by a unique code generation means whenever the user generates a request for a communication, said unique code being generated by an encryption algorithm which receives the first input data and the second input data, said unique code being a derivative of the first input data and the second input data in correlation with parameters defined by the encryption algorithm for encrypting;
d. storing the generated unique codes in encrypted manner in order to reference a user for all authorization in a database;
e. creating/retrieving a verification code in accordance with the code that is to be received from the user for purposes of matching by a computation means; and
f. matching the verification code or first input data by a matching means.
7. The system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 1, wherein the said system further comprise of a system for allowing a user to input or submit data into a form or a data input interface on an online interface by way of an offline communication made through a separate communication device, wherein the offline communication made is a communication including a phone call, a SMS, a MMS, electronic communication, a an email, and a combination thereof.
8. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 1, further comprises a feature of using a mode of a user/data authentication or verification using biometric identity related code of a user.
9. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 1, wherein the electronic device is selected from a group comprising a phone, a cell phone, a mobile phone, a phone, telecommunication enabled data entry device, Internet enabled data entry device, wireless communication based data entry device, wired communication based data entry device and a combination thereof.
10. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 1, wherein the pointer data is a combination of alphanumeric characters or other symbols which represent a specific identifiable characteristic selected from a group comprising a telephone number, a mobile number, SMS Keyword, Short Code, extension number, numerical input after connecting to a call, email ID, PIN (personal identification number) number, TIN (Telephone Identification Number), a URL (uniform resource locator), a QR code (Quick Response Code), a hint or secret question, a captcha enabled access, an image, a sound or music based communication, a puzzle, a hint statement, and a combination thereof.
11. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 1, wherein the pointer data is distinct and unique in association to a pointer parameter, such that the pointer data is used to indicate and identify the pointer parameter; and
wherein the pointer parameter is selected from the group comprising particular webpage where the pointer data is displayed; geographical location of a user, time of display; other identifiable parameters which are particularly used for user tracking or user verification or user authentication; and combinations thereof.
12. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 1, wherein the data in the text fields is submitted using various pointer data that are generated and with the aid of the remote entering/submitting mechanism using the generated pointer data to perform the act of entering/submitting; and
wherein a unique identity of the remote entering/submitting mechanism is captured by the central interface system.
13. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 12, wherein the unique identity is not stored the system.
14. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 2, wherein a second input means is adapted to allow an input of a voice data in the user's own voice; and
wherein the user is prompted to speak in to an audio receipt component of the system; and
wherein a voice detection mechanism identifies/extracts key parameters from the received voice data in order to determine the uniqueness of the voice data and the corresponding user.
15. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 2, wherein, each user is provided with a specific user-defined or system-defined text data which is unique to the user; and wherein the system is capable of receiving the user-defined or system-defined text or any data in the voice of the user, in full or in part, in order to recognize a user.
16. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 1, the system further comprises of a parallel communication triggering component.
17. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 1, wherein the system comprises of a do-not-disturb mode identification component.
18. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 1, wherein the system is linked to a ‘Ecommerce User Credit Rating Registry’.
19. A system for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 2, wherein the second input means is adapted to allow an input of a data other than voice data.
20. A method for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 4, wherein receiving a communication linked to a pointer data from an electronic device, by a central interface system is enabled by an offline communication made through a separate communication device, wherein the offline communication made is a communication including a phone call, a SMS, a MMS, electronic communication, a an email, and a combination thereof.
21. A method for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 4, wherein the pointer data is a combination of alphanumeric characters or other symbols which represent a specific identifiable characteristic selected from a group comprising a telephone number, a mobile number, SMS Keyword, Short Code, extension number, numerical input after connecting to a call, email ID, PIN (personal identification number) number, TIN (Telephone Identification Number), a URL (uniform resource locator), a QR code (Quick Response Code), a hint or secret question, a captcha enabled access, an image, a sound or music based communication, a puzzle, a hint statement, and combination thereof.
22. A method for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 4, wherein the pointer data is distinct and unique in association to a pointer parameter, such that the pointer data is used to indicate and identify the pointer parameter; and wherein the pointer parameter is selected from the group comprising particular webpage where the pointer data is displayed; geographical location of a user, time of display; other identifiable parameters which are particularly used for user tracking or user verification or user authentication; and combinations thereof.
23. A method for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 4, wherein the data in the text fields is submitted using various pointer data that are generated and with the aid of the remote entering/submitting mechanism using the generated pointer data to perform the act of entering/submitting; and wherein a unique identity of the remote entering/submitting mechanism is captured by the central interface system.
24. A method for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 4, additionally comprising a step of identifying whether an electronic device is enabled with a Do-Not-Disturb mode using a Do-Not-Disturb mode identification component.
25. A method for data entering and submission for an online interface using a remote entering/submitting mechanism of claim 4, additionally comprising the step of initiating a communication between the user of the system and a second person or a second system using a parallel communication triggering component.
26. A computer program product for data entering and submission for an online interface using a remote entering/submitting mechanism, the computer program product embodied in a computer readable medium that, when executing on a computer, performs steps comprising
a. entering data in a data entry field in an online interface system by a user;
b. providing a remote entering/submitting mechanism comprising a device for facilitating the remote entry or remote submission;
c. generating/retrieving pointer data to be displayed on the online interface system;
d. pre-populating a database comprising pointer data which are pre-defined for the use of the method;
e. receiving communication from the device in response to generated pointer data;
f. acknowledging communication from a device in relation to a generated pointer; and
g. storing correlative information in relation to various types of pre-defined pointer data.
US14/405,443 2012-04-05 2013-04-05 Systems and methods to input or access data using remote submitting mechanism Active 2035-10-18 US10198417B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
IN1118MU2012 2012-04-05
IN1118/MUM/2012 2012-04-05
PCT/IB2013/052726 WO2013150492A1 (en) 2012-04-05 2013-04-05 Systems and methods to input or access data using remote submitting mechanism

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2013/052726 A-371-Of-International WO2013150492A1 (en) 2012-04-05 2013-04-05 Systems and methods to input or access data using remote submitting mechanism

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/234,662 Continuation US20190155891A1 (en) 2012-04-05 2018-12-28 Systems and Methods to Input or Access Data Using Remote Submitting Mechanism

Publications (2)

Publication Number Publication Date
US20160062971A1 true US20160062971A1 (en) 2016-03-03
US10198417B2 US10198417B2 (en) 2019-02-05

Family

ID=48521376

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/405,443 Active 2035-10-18 US10198417B2 (en) 2012-04-05 2013-04-05 Systems and methods to input or access data using remote submitting mechanism
US16/234,662 Abandoned US20190155891A1 (en) 2012-04-05 2018-12-28 Systems and Methods to Input or Access Data Using Remote Submitting Mechanism

Family Applications After (1)

Application Number Title Priority Date Filing Date
US16/234,662 Abandoned US20190155891A1 (en) 2012-04-05 2018-12-28 Systems and Methods to Input or Access Data Using Remote Submitting Mechanism

Country Status (3)

Country Link
US (2) US10198417B2 (en)
EP (1) EP2856383A1 (en)
WO (1) WO2013150492A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170213558A1 (en) * 2016-01-27 2017-07-27 Bristol, Inc. D/B/A Remote Automation Solutions Voice interfaces in process control systems
US20180253565A1 (en) * 2015-09-22 2018-09-06 Alibaba Group Holding Limited Secure voice communication method and device based on instant communication
US10372804B2 (en) 2016-05-17 2019-08-06 Bruce HASSEL Interactive audio validation/assistance system and methodologies

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105512542B (en) * 2015-12-10 2018-09-04 小米科技有限责任公司 Data inputting method and device

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6199079B1 (en) * 1998-03-09 2001-03-06 Junglee Corporation Method and system for automatically filling forms in an integrated network based transaction environment
US20030115060A1 (en) * 2001-12-13 2003-06-19 Junqua Jean-Claude System and interactive form filling with fusion of data from multiple unreliable information sources
US20030120626A1 (en) * 2001-12-20 2003-06-26 Koninklijke Philips Electronics N.V. Voice-enabled, consumer transaction system
US20040039990A1 (en) * 2002-03-30 2004-02-26 Xorbix Technologies, Inc. Automated form and data analysis tool
US20050096906A1 (en) * 2002-11-06 2005-05-05 Ziv Barzilay Method and system for verifying and enabling user access based on voice parameters
US20060059434A1 (en) * 2004-09-16 2006-03-16 International Business Machines Corporation System and method to capture and manage input values for automatic form fill
US20060070126A1 (en) * 2004-09-26 2006-03-30 Amiram Grynberg A system and methods for blocking submission of online forms.
US20060074652A1 (en) * 2004-09-20 2006-04-06 International Business Machines Corporation Method and system for voice-enabled autofill
US20060153346A1 (en) * 2005-01-11 2006-07-13 Metro Enterprises, Inc. On-line authentication registration system
US20080288299A1 (en) * 2006-10-31 2008-11-20 Genmobi Technologies, Inc. System and method for user identity validation for online transactions
US20090006202A1 (en) * 2007-02-26 2009-01-01 Picup, Llc System and method for providing identity-based services
US20090328149A1 (en) * 2008-06-26 2009-12-31 Joseph Lyons Method and system for managing the access and use of electronic forms
US20100037303A1 (en) * 2008-08-08 2010-02-11 Microsoft Corporation Form Filling with Digital Identities, and Automatic Password Generation
US7689832B2 (en) * 2000-09-11 2010-03-30 Sentrycom Ltd. Biometric-based system and method for enabling authentication of electronic messages sent over a network
US20110119276A1 (en) * 2009-11-17 2011-05-19 Sendside Networks, Inc Submission capture, auto-response and processing system
US20120297190A1 (en) * 2011-05-19 2012-11-22 Microsoft Corporation Usable security of online password management with sensor-based authentication
US20130139239A1 (en) * 2011-11-29 2013-05-30 Telesign Corporation Dual code authentication system
US8924310B2 (en) * 1999-08-31 2014-12-30 Lead Core Fund, L.L.C. Methods and apparatus for conducting electronic transactions
US9652802B1 (en) * 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7218921B2 (en) * 2000-05-12 2007-05-15 Chikka Pte Ltd Method and system for inviting and creating accounts for prospective users of an instant messaging system
US7870599B2 (en) * 2000-09-05 2011-01-11 Netlabs.Com, Inc. Multichannel device utilizing a centralized out-of-band authentication system (COBAS)
JP2005507106A (en) * 2001-10-17 2005-03-10 エヌ・ピー・エックス テクノロジース リミテッド Verification of person identifiers received online
WO2005013597A2 (en) * 2003-07-25 2005-02-10 Keepmedia, Inc. Personalized content management and presentation systems
US7269590B2 (en) * 2004-01-29 2007-09-11 Yahoo! Inc. Method and system for customizing views of information associated with a social network user
US7693863B2 (en) * 2004-12-20 2010-04-06 Claria Corporation Method and device for publishing cross-network user behavioral data
US20070027751A1 (en) * 2005-07-29 2007-02-01 Chad Carson Positioning advertisements on the bases of expected revenue
US20080242279A1 (en) * 2005-09-14 2008-10-02 Jorey Ramer Behavior-based mobile content placement on a mobile communication facility
JP2007102778A (en) * 2005-10-04 2007-04-19 Forval Technology Inc User authentication system and method therefor
US7856445B2 (en) * 2005-11-30 2010-12-21 John Nicholas and Kristin Gross System and method of delivering RSS content based advertising
CN1992596A (en) * 2005-12-27 2007-07-04 国际商业机器公司 User authentication device and method
US20080077574A1 (en) * 2006-09-22 2008-03-27 John Nicholas Gross Topic Based Recommender System & Methods
US20080115198A1 (en) * 2006-10-31 2008-05-15 Hsu Paul J Multi-factor authentication transfer
US20080201643A1 (en) * 2007-02-01 2008-08-21 7 Billion People, Inc. System for creating customized web content based on user behavioral portraits
US20080221987A1 (en) * 2007-03-07 2008-09-11 Ebay Inc. System and method for contextual advertisement and merchandizing based on an automatically generated user demographic profile
US8965786B1 (en) * 2008-04-18 2015-02-24 Google Inc. User-based ad ranking
US8307412B2 (en) * 2008-10-20 2012-11-06 Microsoft Corporation User authentication management
US8620365B2 (en) * 2009-07-20 2013-12-31 Halter's Chop Chop Method for handling an electronic request with the aid of an intermediary entity
US9679060B2 (en) * 2010-10-13 2017-06-13 Microsoft Technology Licensing, Llc Following online social behavior to enhance search experience
US8839390B2 (en) * 2011-03-08 2014-09-16 Microsoft Corporation Grouping personal accounts to tailor a web service
WO2013159110A1 (en) * 2012-04-20 2013-10-24 Conductiv Software, Inc. Multi-factor mobile transaction authentication
US20150319613A1 (en) * 2012-08-25 2015-11-05 Viber Media Sarl Co-Activation For Authenticating A User's Registration
US9355231B2 (en) * 2012-12-05 2016-05-31 Telesign Corporation Frictionless multi-factor authentication system and method
US20160012464A1 (en) * 2013-03-15 2016-01-14 Thomas BRYANT, III Social-referral network methods and apparatus
US10057289B2 (en) * 2013-08-12 2018-08-21 International Business Machines Corporation Adjusting multi-factor authentication using context and pre-registration of objects
US9350717B1 (en) * 2013-09-23 2016-05-24 Amazon Technologies, Inc. Location service for user authentication
US9578025B2 (en) * 2013-10-14 2017-02-21 Zumigo, Inc. Mobile network-based multi-factor authentication
US9213814B2 (en) * 2014-02-07 2015-12-15 Bank Of America Corporation User authentication based on self-selected preferences

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6199079B1 (en) * 1998-03-09 2001-03-06 Junglee Corporation Method and system for automatically filling forms in an integrated network based transaction environment
US8924310B2 (en) * 1999-08-31 2014-12-30 Lead Core Fund, L.L.C. Methods and apparatus for conducting electronic transactions
US7689832B2 (en) * 2000-09-11 2010-03-30 Sentrycom Ltd. Biometric-based system and method for enabling authentication of electronic messages sent over a network
US20030115060A1 (en) * 2001-12-13 2003-06-19 Junqua Jean-Claude System and interactive form filling with fusion of data from multiple unreliable information sources
US20030120626A1 (en) * 2001-12-20 2003-06-26 Koninklijke Philips Electronics N.V. Voice-enabled, consumer transaction system
US20040039990A1 (en) * 2002-03-30 2004-02-26 Xorbix Technologies, Inc. Automated form and data analysis tool
US20050096906A1 (en) * 2002-11-06 2005-05-05 Ziv Barzilay Method and system for verifying and enabling user access based on voice parameters
US20060059434A1 (en) * 2004-09-16 2006-03-16 International Business Machines Corporation System and method to capture and manage input values for automatic form fill
US7953597B2 (en) * 2004-09-20 2011-05-31 Nuance Communications, Inc. Method and system for voice-enabled autofill
US20060074652A1 (en) * 2004-09-20 2006-04-06 International Business Machines Corporation Method and system for voice-enabled autofill
US20060070126A1 (en) * 2004-09-26 2006-03-30 Amiram Grynberg A system and methods for blocking submission of online forms.
US20060153346A1 (en) * 2005-01-11 2006-07-13 Metro Enterprises, Inc. On-line authentication registration system
US20080288299A1 (en) * 2006-10-31 2008-11-20 Genmobi Technologies, Inc. System and method for user identity validation for online transactions
US20090006202A1 (en) * 2007-02-26 2009-01-01 Picup, Llc System and method for providing identity-based services
US20090328149A1 (en) * 2008-06-26 2009-12-31 Joseph Lyons Method and system for managing the access and use of electronic forms
US20100037303A1 (en) * 2008-08-08 2010-02-11 Microsoft Corporation Form Filling with Digital Identities, and Automatic Password Generation
US20110119276A1 (en) * 2009-11-17 2011-05-19 Sendside Networks, Inc Submission capture, auto-response and processing system
US9652802B1 (en) * 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US20120297190A1 (en) * 2011-05-19 2012-11-22 Microsoft Corporation Usable security of online password management with sensor-based authentication
US20130139239A1 (en) * 2011-11-29 2013-05-30 Telesign Corporation Dual code authentication system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180253565A1 (en) * 2015-09-22 2018-09-06 Alibaba Group Holding Limited Secure voice communication method and device based on instant communication
US10867065B2 (en) * 2015-09-22 2020-12-15 Alibaba Group Holding Limited Secure voice communication method and device based on instant communication
US20170213558A1 (en) * 2016-01-27 2017-07-27 Bristol, Inc. D/B/A Remote Automation Solutions Voice interfaces in process control systems
US9972321B2 (en) * 2016-01-27 2018-05-15 Bristol, Inc. Voice interfaces in process control systems
US10372804B2 (en) 2016-05-17 2019-08-06 Bruce HASSEL Interactive audio validation/assistance system and methodologies

Also Published As

Publication number Publication date
EP2856383A1 (en) 2015-04-08
US10198417B2 (en) 2019-02-05
US20190155891A1 (en) 2019-05-23
WO2013150492A1 (en) 2013-10-10

Similar Documents

Publication Publication Date Title
Hernandez-Castro et al. An economic analysis of ransomware and its welfare consequences
US11256812B2 (en) End user social network protection portal
US11403400B2 (en) Troll account detection
US10223524B1 (en) Compromised authentication information clearing house
US11418527B2 (en) Malicious social media account identification
Yeboah-Boateng et al. Phishing, SMiShing & Vishing: an assessment of threats against mobile devices
Khan et al. Survey on mobile user's data privacy threats and defense mechanisms
US10862843B2 (en) Computerized system and method for modifying a message to apply security features to the message's content
US20190155891A1 (en) Systems and Methods to Input or Access Data Using Remote Submitting Mechanism
US9838384B1 (en) Password-based fraud detection
EP2673708B1 (en) DISTINGUISH VALID USERS FROM BOTS, OCRs AND THIRD PARTY SOLVERS WHEN PRESENTING CAPTCHA
US10462665B2 (en) Multifactor network authentication
US11757914B1 (en) Automated responsive message to determine a security risk of a message sender
US20100205297A1 (en) Systems and methods for dynamic detection of anonymizing proxies
US9824207B1 (en) Authentication information update based on fraud detection
KR20100121620A (en) Captcha advertising
Wright et al. Cyber security and mobile threats: The need for antivirus applications for smart phones
US10462126B2 (en) Self-adjusting multifactor network authentication
Choudhary et al. Comparative analysis of mobile phishing detection and prevention approaches
Hassan et al. Digital Privacy and Security Using Windows: A Practical Guide
Jakobsson The death of the internet
US10567171B2 (en) Client-side security key generation
Bari et al. Securing digital economies: Detection of phishing attacks using machine learning approaches
James Engineering the Human Mind: Social Engineering Attack Using Kali Linux
Nguyen et al. Social Engineering Attacks in Healthcare Systems: A Survey

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, MICRO ENTITY (ORIGINAL EVENT CODE: M3551); ENTITY STATUS OF PATENT OWNER: MICROENTITY

Year of fee payment: 4